Compare commits
1 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
c840a57934 |
5
Makefile
5
Makefile
@@ -10,12 +10,13 @@
|
|||||||
|
|
||||||
export SRCPKG = openssh
|
export SRCPKG = openssh
|
||||||
export DEPENDS = glibc,openssl,zlib
|
export DEPENDS = glibc,openssl,zlib
|
||||||
|
export BUILDDEPS = file,gcc,linux-libc,openssl-dev
|
||||||
export ARCH = x86_64
|
export ARCH = x86_64
|
||||||
export URL = http://www.openssh.com/
|
export URL = http://www.openssh.com/
|
||||||
BRIEF = OpenSSH client and server
|
BRIEF = OpenSSH client and server
|
||||||
DESC = OpenSSH is the premier connectivity tool for remote login with the \
|
DESC = OpenSSH is the premier connectivity tool for remote login with the \
|
||||||
SSH protocol.
|
SSH protocol.
|
||||||
SNAPVER = 6
|
SNAPVER = 7
|
||||||
|
|
||||||
ARCHIVE := $(PWD)/SRC/$(shell ls SRC|egrep '(bz2|gz|tar|xz)$$'|tail -1)
|
ARCHIVE := $(PWD)/SRC/$(shell ls SRC|egrep '(bz2|gz|tar|xz)$$'|tail -1)
|
||||||
TYPE := $(shell file -ib $(ARCHIVE)|cut -d';' -f1|tr -d '\n')
|
TYPE := $(shell file -ib $(ARCHIVE)|cut -d';' -f1|tr -d '\n')
|
||||||
@@ -30,6 +31,7 @@ SERVER := $(PWD)/openssh-server
|
|||||||
SERVERROOT := $(SERVER)/ROOT
|
SERVERROOT := $(SERVER)/ROOT
|
||||||
|
|
||||||
$(SERVERROOT): $(CLIENTROOT)
|
$(SERVERROOT): $(CLIENTROOT)
|
||||||
|
cp -v $(PWD)/SNAP/usher-server $(SERVER)/SNAP/usher && \
|
||||||
cd $(SERVER) && make -f ../Makefile.server && mv *.snap ../
|
cd $(SERVER) && make -f ../Makefile.server && mv *.snap ../
|
||||||
|
|
||||||
$(CLIENTROOT): $(SRCDIR)/sshd
|
$(CLIENTROOT): $(SRCDIR)/sshd
|
||||||
@@ -68,6 +70,7 @@ $(CLIENTROOT): $(SRCDIR)/sshd
|
|||||||
$(SERVERROOT)/usr/share/man/man5/sshd_config.5 && \
|
$(SERVERROOT)/usr/share/man/man5/sshd_config.5 && \
|
||||||
mv -v $(CLIENTROOT)/usr/share/man/man8/sftp-server.8 \
|
mv -v $(CLIENTROOT)/usr/share/man/man8/sftp-server.8 \
|
||||||
$(SERVERROOT)/usr/share/man/man8/sftp-server.8 && \
|
$(SERVERROOT)/usr/share/man/man8/sftp-server.8 && \
|
||||||
|
cp -v $(PWD)/SNAP/usher-client $(CLIENT)/SNAP/usher && \
|
||||||
cd $(CLIENT) && make -f ../Makefile.client && mv *.snap ../
|
cd $(CLIENT) && make -f ../Makefile.client && mv *.snap ../
|
||||||
|
|
||||||
$(SRCDIR)/configure: $(ARCHIVE)
|
$(SRCDIR)/configure: $(ARCHIVE)
|
||||||
|
|||||||
@@ -32,9 +32,15 @@ case "$1" in
|
|||||||
exit $error
|
exit $error
|
||||||
;;
|
;;
|
||||||
stop)
|
stop)
|
||||||
log_init_msg "Stopping OpenBSD Secure Shell server"
|
pid=`pidofproc -p "$PIDFILE" "$DAEMON"`
|
||||||
|
|
||||||
killproc "$DAEMON" -TERM && log_success_msg || log_failure_msg
|
if [ -n "$pid" ]; then
|
||||||
|
log_init_msg "Stopping OpenBSD Secure Shell server"
|
||||||
|
|
||||||
|
killproc "$DAEMON" -TERM && log_success_msg || log_failure_msg
|
||||||
|
else
|
||||||
|
log_init_msg "OpenBSD Secure Shell server not running" && log_success_msg
|
||||||
|
fi
|
||||||
;;
|
;;
|
||||||
reload|restart)
|
reload|restart)
|
||||||
log_init_msg "Restarting OpenBSD Secure Shell server"
|
log_init_msg "Restarting OpenBSD Secure Shell server"
|
||||||
|
|||||||
20
SNAP/usher-client
Executable file
20
SNAP/usher-client
Executable file
@@ -0,0 +1,20 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
case $1 in
|
||||||
|
preinst)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
postinst)
|
||||||
|
if [ ! -f ${TARGET}/etc/ssh/ssh_config ]; then
|
||||||
|
cp ${TARGET}/usr/share/openssh/ssh_config ${TARGET}/etc/ssh
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
prerm)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
postrm)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
esac
|
||||||
66
SNAP/usher-server
Executable file
66
SNAP/usher-server
Executable file
@@ -0,0 +1,66 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
case $1 in
|
||||||
|
preinst)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
postinst)
|
||||||
|
if [[ ${TARGET} ]]; then
|
||||||
|
if ! chroot ${TARGET} 'getent group sshd 2>&1' > /dev/null; then
|
||||||
|
if chroot ${TARGET} 'groupadd -g 50 sshd'; then
|
||||||
|
echo 'Created group sshd'
|
||||||
|
else
|
||||||
|
echo 'Failed to create group sshd!'
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
if ! chroot ${TARGET} 'getent passwd sshd 2>&1 > /dev/null'; then
|
||||||
|
if chroot ${TARGET} 'useradd -c "sshd PrivSep" \
|
||||||
|
-d /var/run/sshd -g sshd -s /bin/false -u 50 sshd'; then
|
||||||
|
echo 'Created user sshd'
|
||||||
|
else
|
||||||
|
echo 'Failed to create user sshd!'
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -f ${TARGET}/etc/ssh/ssh_host_rsa_key ]; then
|
||||||
|
chroot ${TARGET} 'ssh-keygen -A'
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
if ! getent group sshd 2>&1 > /dev/null; then
|
||||||
|
if groupadd -g 50 sshd; then
|
||||||
|
echo 'Created group sshd'
|
||||||
|
else
|
||||||
|
echo 'Failed to create group sshd!'
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
if ! getent passwd sshd 2>&1 > /dev/null; then
|
||||||
|
if useradd -c 'sshd PrivSep' -d /var/run/sshd -g sshd \
|
||||||
|
-s /bin/false -u 50 sshd; then
|
||||||
|
echo 'Created user sshd'
|
||||||
|
else
|
||||||
|
echo 'Failed to create user sshd!'
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -f /etc/ssh/ssh_host_rsa_key ]; then
|
||||||
|
ssh-keygen -A
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -f ${TARGET}/etc/ssh/sshd_config ]; then
|
||||||
|
cp ${TARGET}/usr/share/openssh/sshd_config ${TARGET}/etc/ssh
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
prerm)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
postrm)
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
esac
|
||||||
Reference in New Issue
Block a user